SlideShare a Scribd company logo
IACS Network Security & Secure RemoteAccess
Guy Denis gudenis@cisco.com
Rockwell Automation Alliance Manager Europe
www.cisco.com/go/security
11th Feb 2014
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
On Average, there is a ratio of 15:1 Industrial
Devices to Enterprise within a manufacturing plant
Industrial Devices
Meter
Sensor
Machines Vehicles Robots
HMII/O
Controller/PLC
Scanner Phone RFID Tag
Enterprise Devices
IP Phone PC Printers Servers
“As manufacturers replace legacy network systems and look for
areas to streamline on a common solution, ARC sees a tremendous
opportunity for growth of EtherNet/IP applications,” according to
Craig Resnick, Research Director, ARC Advisory Group
1
15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
TheftUnintended employee
action
Natural or manmade disaster
Unauthorized
contractor actions
Security patches
Worms, viruses, malware
Denial of serviceSabotage
Unauthorized access
Unauthorized employee
action
Potential Disruptions
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Stuxnet – a wake up call…. breakdown of
Stuxnet
http://www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html
Ralph Langner
German Control systems security
consultant
F-Secure wrap-up on Stuxnet
http://www.youtube.com/watch?v=gFzadFI7sco
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
• Fragile TCP/IP Stacks – NMAP, Ping Sweep lockup
• Little or no device level authentication
• Poor network design – hubs, unmanaged switches
• Windows based IA servers – patching, legacy OS
• Unnecessary services running – FTP, HTTP
• Open environment, no port security, no physical security of switch, Ethernet
ports
• Limited auditing and monitoring of access to IA devices
• Unauthorised use of HMI, IA systems for browsing, music/movie downloads
• Lack of IT expertise in IA networks, many blind spots
Defense in DepthApproach
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Real–Time Control
Fast Convergence
Traffic Segmentation and
Management
Ease of Use
Site Operations and Control
Multi-Service Networks
Network and Security
Management
Routing
Application and Data share
Access Control
Threat Protection
Gbps Link for
Failover Detection
Firewall
(Active)
Firewall
(Standby)
SCADA Application
and Services Servers
Cisco
ASA 5500
Cisco
Catalyst
Switch
Network Services
Cisco Catalyst
6500/4500
Cisco Cat. 3750X
StackWise
Switch Stack
Patch Management, Terminal
Services, Application Mirrors,
AV Servers
Cell/Area #1
(Redundant Star
Topology)
Drive
Controller
HMI Distributed
I/O
Controller
DriveDrive
HMI
Distributed I/O
HMI
Cell/Area #2
(Ring Topology)
Cell/Area #3
(Linear Topology)
IE3000/3010/2000
Layer 2 Access Switch
Controller
Enterprise/IT Integration
Collaboration
Wireless
Application Optimization
Cell/Area Zone
Levels 0–2
Layer 2 Access
Manufacturing Zone
Level 3
Distribution and Core
Demilitarized Zone
(DMZ) Firewalls
Enterprise Network
Levels 4–5
Web Apps DNS FTP
Internet
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
• Physical Security – limit physical access to authorized
personnel: areas, control panels, devices, cabling, and
control room – escort and track visitors
• Network Hardening – infrastructure framework – e.g.
firewalls with intrusion detection and intrusion prevention
systems (IDS/IPS), and integrated protection of networking
equipment such as switches and routers
• End-point Hardening – patch management, antivirus
software as well as removal of unused applications,
protocols, and services
• Application Security – authentication, authorization, and
audit software
• Device Hardening – change management and restrictive
access
Defense
in Depth
Computer
Device
Physical
Network
Application
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
• Security is not a bolt-on
component
• Comprehensive Network
Security Model for
Defense-in-Depth
• Industrial Security Policy
• DMZ Implementation
• Design Remote Partner Access
Policy, with robust & secure
implementation
Secure NetworkArchitectures for
Industrial Control Systems
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Panduit/RA Physical Layer Reference Architectures Design Guide
PSL-DCPL
PSL-DCJB
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
• All network traffic from either side of the DMZ terminates in the DMZ;
network traffic does not directly traverse the DMZ
• Application Data Mirror
• No primary services are permanently
housed in the DMZ
• DMZ shall not permanently
house data
• No control traffic into the DMZ
• Be prepared to “turn-off” access
via the firewall
No Direct
Traffic
Enterprise
Security
Zone
Industrial
Security
Zone
Disconnect Point
Disconnect Point
DMZReplicated
Services
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Level 5
Level 4
Level 3
Level 2
Level 1
Level 0
Terminal
Services
Patch
Management
AV
Server
Application
Mirror
Web Services
Operations
Application
Server
Enterprise Network
Site Business Planning and Logistics NetworkE-Mail, Intranet, etc.
SCADA
App
Server
SCADA
Directory
Engineering
Workstation
Domain
Controller
SCADA
Client
Operator
Interface
SCADA
Client
Engineerin
g
Workstatio
n
Operato
r
Interfac
e
Batch
Control
Discrete
Control
Drive
Control
Continuou
s
Process
Control
Safety
Control
Sensors Drives Actuators Robots
Enterprise
Zone
DMZ
Process
Control
Domain
Process
Control
Network
Web
E-Mail
CIP
Firewal
l
Firewall
Site Manufacturing Operations and
Control
Area Supervisory
Control
Basic Control
Process
PurdueReferenceModel,ISA-95
IndustrialSecurityStandardISA-99
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
1.Firewall Services (Segmentation, Isolation)
2.Application Services (Behavior Enforcement, Application
Intelligence and Awareness, Gateway Capabilities)
3.Logging and Historical Services (Traffic, Event histories)
4.Encryption and Data Integrity Services (remote access, and
secure channels for data transfer)
5.IPS/IDS Services (deep packet inspection – Sourcefire and
Wurldtech Industrial Signatures
1.Malware Detection and Filtering (deep packet and URL
inspection
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
VPN
VDI
WSA
IPS
ASA-CX
ASA
ISE
Level 5
Level 4
Level 3
Level 2
Level 1
Level 0
Level
3½
Enterprise Zone
DMZ
PCD /
Manufacturing Zone
PCN /
Cell / Area Zone
1783-SR
Secure Remote Access
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Use Stratix 5900 (1783-SR)
NOT this (or similar such item)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
DefenseinDepth
Securitytechnologiesapplied
Authentication, Authorization and Accounting
Access Control Lists (ACLs)
Secure Browsing (HTTPS)
Intrusion Protection and Detection
Remote Terminal Session
Application Security
VLANs
Remote Engineers and Partners
Plant Floor Applications and Data
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
WAN
Plant Engineer
Skid Builder
System Integrator
Remote Site
WAN
Router
Plant Site
WAN
Router
• Stand-alone Remote Industrial Application
Example: remote site
Requirements
Connection out from the Plant, direct access
Little to no IT support, little to no alignment with Industrial Automation and Control System security
standards
Potential Solution
IPSecVPN, DMVPN,FlexVPN – ASA5515 and/or STX5900
1783-SR/819
ISR
IPSec
X many
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Cell/Area Zone #3 Cell/Area Zone #4
FactoryTalk
Applications
and Services Ring Topology
Cell/Area Zone #1 Cell/Area Zone #2
Manufacturing Zone
8000 Managed
Layer 2 Switch
ETAP - Embedded
Layer 2 Switch
Ring Topology
Enterprise Zone Enterprise
Network
5700 Managed
Layer 2 Switch
Star Topology
Embedded Layer 2
Switch Linear
Topology
Mobile User
Lightweight AP
(LWAP)
AP as Workgroup
Bridge (WGB)
ERP, Email, Wide Area
Network (WAN)
5100
802.11n – Dual Band
Access point
8300 Managed
Layer 3 Switch
5900 Industrial
Services Router
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Levels 0–2
Cell/Area Zones
Demilitarized Zone (DMZ)
Demilitarized Zone (DMZ)
Enterprise Zone
Levels 4 and 5
Manufacturing Zone
Site Manufacturing
Operations and Control
Level 3
Internet
Enterprise Zone
Levels 4 and 5
Enterprise
WAN
Enterprise
Data Center
Gbps Link Failover
Detection
Firewall
(Active)
Firewall
(Standby)
Patch Management
Terminal Services
Application Mirror
AV Server
Cisco
ASA 5500
Remote Access Server
• RSLogix 5000
• FactoryTalk View Studio
Catalyst
6500/4500
Remote Engineer
or Partner
Enterprise
Connected
Engineer
Enterprise Edge
Firewall
HTTPS
Cisco VPN Client
Remote Desktop
Protocol (RDP)
Catalyst 3750
StackWise
Switch Stack
EtherNet/IP
IPSECVPN
SSLVPN
FactoryTalk Application Servers
• View
• Historian
• AssetCentre
• Transaction Manager
FactoryTalk Services
Platform
• Directory
• Security/Audit
Data Servers
1. Remote engineer or partner
establishes VPN to corporate
network; access is restricted to
IP address of plant DMZ firewall
2. Portal on plant firewall enables
access to IACS data, files and
applications
– Intrusion protection system (IPS) on
plant firewall detects and protects
against attacks from remote host
3. Firewall proxies a client session
to remote
access server
4. Access to applications on
remote access server is
restricted to specified plant floor
IACS resources through IACS
application security
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
1. Identify all connections to SCADA networks
2. Disconnect unnecessary connections to the SCADA network
3. Evaluate and strengthen the security of any remaining connections to the SCADA network
4. Harden SCADA networks by removing or disabling unnecessary services
5. Do not rely on proprietary protocols to protect your system
6. Implement the security features provided by device and system vendors
7. Establish strong controls over any medium that is used as a backdoor into the SCADA network
8. Implement internal and external intrusion detection systems and establish 24-hour-a-day
incident monitoring
9. Perform technical audits of SCADA devices and networks, and any other connected
networks, to identify security concerns
10. Conduct physical security surveys and assess all remote sites connected to the
SCADA network to evaluate their security
11. Establish SCADA “Red Teams” to identify and evaluate possible attack scenarios
12. Clearly define cyber security roles, responsibilities, and authorities for managers,
system administrators, and users
13. Document network architecture and identify systems that serve critical functions
or contain sensitive information that require additional levels of protection
14. Establish a rigorous, ongoing risk management process
15. Establish a network protection strategy based on the principle of defense-in-depth
16. Clearly identify cyber security requirements
17. Establish effective configuration management processes
18. Conduct routine self-assessments
19. Establish system backups and disaster recovery plans
20. Senior organizational leadership should establish expectations for cyber security
performance and hold individuals accountable for their performance
21. Establish policies and conduct training to minimize the likelihood that organizational
personnel will inadvertently disclose sensitive information regarding SCADA system
design, operations, or security controls
21 Steps to securing a SCADA network
http://www.oe.netl.doe.gov/docs/prepare/21stepsbooklet.pdf
Routeco cyber security and secure remote access 1 01

More Related Content

PDF
What Every It Professional Should Know
PDF
IT vs. OT: ICS Cyber Security in TSOs
PDF
Cyber Security: Differences between Industrial Control Systems and ICT Approach
PDF
Securing SCADA
PDF
Nozomi Networks SCADAguardian - Data-Sheet
PDF
Industrial Control Cyber Security Europe 2015
PDF
Nozomi Networks Q1_2018 Company Introduction
PDF
[CLASS 2014] Palestra Técnica - Delfin Rodillas
What Every It Professional Should Know
IT vs. OT: ICS Cyber Security in TSOs
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Securing SCADA
Nozomi Networks SCADAguardian - Data-Sheet
Industrial Control Cyber Security Europe 2015
Nozomi Networks Q1_2018 Company Introduction
[CLASS 2014] Palestra Técnica - Delfin Rodillas

What's hot (20)

PPTX
Nozomi Fortinet Accelerate18
PDF
Should I Patch My ICS?
PPTX
Critical Infrastructure Security by Subodh Belgi
PDF
Active Directory in ICS: Lessons Learned From The Field
PDF
Nist 800 82 ICS Security Auditing Framework
PDF
Augmentation of a SCADA based firewall against foreign hacking devices
PDF
Unidirectional Security, Andrew Ginter of Waterfall Security
PDF
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
PDF
ICS security
PPTX
CyberSecurity Best Practices for the IIoT
PPTX
Hacker Halted 2016 - How to get into ICS security
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
The journey to ICS - Extended
PDF
Nozomi networks-solution brief
PDF
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
PPTX
SANS ICS Security Survey Report 2016
PDF
White paper scada (2)
PPTX
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
PDF
Cybersecurity for modern industrial systems
PDF
10. industrial networks safety and security tom hammond
Nozomi Fortinet Accelerate18
Should I Patch My ICS?
Critical Infrastructure Security by Subodh Belgi
Active Directory in ICS: Lessons Learned From The Field
Nist 800 82 ICS Security Auditing Framework
Augmentation of a SCADA based firewall against foreign hacking devices
Unidirectional Security, Andrew Ginter of Waterfall Security
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
ICS security
CyberSecurity Best Practices for the IIoT
Hacker Halted 2016 - How to get into ICS security
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
The journey to ICS - Extended
Nozomi networks-solution brief
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
SANS ICS Security Survey Report 2016
White paper scada (2)
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Cybersecurity for modern industrial systems
10. industrial networks safety and security tom hammond
Ad

Viewers also liked (8)

PPTX
Network security - Defense in Depth
PDF
Industrial Control System Cyber Security and the Employment of Industrial Fir...
PPSX
Summary Of Course Projects
PDF
Denodo Data Virtualization Platform: Scalability (session 3 from Architect to...
PDF
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
PDF
Cyber Security in Manufacturing
PDF
Microsoft Cloud Services Architecture
PDF
Proactive Defense: Understanding the 4 Main Threat Actor Types
Network security - Defense in Depth
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Summary Of Course Projects
Denodo Data Virtualization Platform: Scalability (session 3 from Architect to...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Cyber Security in Manufacturing
Microsoft Cloud Services Architecture
Proactive Defense: Understanding the 4 Main Threat Actor Types
Ad

Similar to Routeco cyber security and secure remote access 1 01 (20)

PDF
Mfg workshop security
PDF
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
PDF
Cisco Connect Ottawa 2018 data centre security
PPTX
Cisco Impresa40 - Trends, Vision, Solutions
PDF
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
PDF
Cisco Connect 2018 Vietnam - Cisco sd-wan-next generation wan to power your d...
PDF
Internet of things
PDF
Cisco connect montreal 2018 secure dc
PDF
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
PDF
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
PDF
Cisco Secure Firewall Test Drive Presentation
PDF
MX Deep Dive PPT
PDF
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
PPTX
[Cisco Connect 2018 - Vietnam] 3. rajinder singh cisco sd-wan-next generati...
PDF
The Changing Data Center Landscape
PDF
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
PDF
Security and Virtualization in the Data Center
PDF
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
PDF
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
PDF
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Mfg workshop security
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Ottawa 2018 data centre security
Cisco Impresa40 - Trends, Vision, Solutions
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
Cisco Connect 2018 Vietnam - Cisco sd-wan-next generation wan to power your d...
Internet of things
Cisco connect montreal 2018 secure dc
Cisco Connect 2018 Philippines - cisco sd-wan-next generation wan to power yo...
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Secure Firewall Test Drive Presentation
MX Deep Dive PPT
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
[Cisco Connect 2018 - Vietnam] 3. rajinder singh cisco sd-wan-next generati...
The Changing Data Center Landscape
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
Security and Virtualization in the Data Center
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...

More from RoutecoMarketing (6)

PDF
The connected enterprise. Is your business ready?
PDF
Stratix 2015
PDF
Fundamentals of ethernet ip osi and cip
PDF
Plantwide Benefits of EtherNet/IP Seminar Billingham 09.07.2014
PDF
EtherNet/IP Seminar Coventry 29.04.14
PDF
Plantwide benefits of EtherNet IP Seminar
The connected enterprise. Is your business ready?
Stratix 2015
Fundamentals of ethernet ip osi and cip
Plantwide Benefits of EtherNet/IP Seminar Billingham 09.07.2014
EtherNet/IP Seminar Coventry 29.04.14
Plantwide benefits of EtherNet IP Seminar

Recently uploaded (20)

PPTX
web development for engineering and engineering
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Mechanical Engineering MATERIALS Selection
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Sustainable Sites - Green Building Construction
PPT
Project quality management in manufacturing
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
web development for engineering and engineering
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CYBER-CRIMES AND SECURITY A guide to understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Mechanical Engineering MATERIALS Selection
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
OOP with Java - Java Introduction (Basics)
bas. eng. economics group 4 presentation 1.pptx
Sustainable Sites - Green Building Construction
Project quality management in manufacturing
Arduino robotics embedded978-1-4302-3184-4.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Internet of Things (IOT) - A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Lesson 3_Tessellation.pptx finite Mathematics

Routeco cyber security and secure remote access 1 01

  • 1. IACS Network Security & Secure RemoteAccess Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe www.cisco.com/go/security 11th Feb 2014
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 On Average, there is a ratio of 15:1 Industrial Devices to Enterprise within a manufacturing plant Industrial Devices Meter Sensor Machines Vehicles Robots HMII/O Controller/PLC Scanner Phone RFID Tag Enterprise Devices IP Phone PC Printers Servers “As manufacturers replace legacy network systems and look for areas to streamline on a common solution, ARC sees a tremendous opportunity for growth of EtherNet/IP applications,” according to Craig Resnick, Research Director, ARC Advisory Group 1 15
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 TheftUnintended employee action Natural or manmade disaster Unauthorized contractor actions Security patches Worms, viruses, malware Denial of serviceSabotage Unauthorized access Unauthorized employee action Potential Disruptions
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Stuxnet – a wake up call…. breakdown of Stuxnet http://www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html Ralph Langner German Control systems security consultant F-Secure wrap-up on Stuxnet http://www.youtube.com/watch?v=gFzadFI7sco
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 • Fragile TCP/IP Stacks – NMAP, Ping Sweep lockup • Little or no device level authentication • Poor network design – hubs, unmanaged switches • Windows based IA servers – patching, legacy OS • Unnecessary services running – FTP, HTTP • Open environment, no port security, no physical security of switch, Ethernet ports • Limited auditing and monitoring of access to IA devices • Unauthorised use of HMI, IA systems for browsing, music/movie downloads • Lack of IT expertise in IA networks, many blind spots
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Real–Time Control Fast Convergence Traffic Segmentation and Management Ease of Use Site Operations and Control Multi-Service Networks Network and Security Management Routing Application and Data share Access Control Threat Protection Gbps Link for Failover Detection Firewall (Active) Firewall (Standby) SCADA Application and Services Servers Cisco ASA 5500 Cisco Catalyst Switch Network Services Cisco Catalyst 6500/4500 Cisco Cat. 3750X StackWise Switch Stack Patch Management, Terminal Services, Application Mirrors, AV Servers Cell/Area #1 (Redundant Star Topology) Drive Controller HMI Distributed I/O Controller DriveDrive HMI Distributed I/O HMI Cell/Area #2 (Ring Topology) Cell/Area #3 (Linear Topology) IE3000/3010/2000 Layer 2 Access Switch Controller Enterprise/IT Integration Collaboration Wireless Application Optimization Cell/Area Zone Levels 0–2 Layer 2 Access Manufacturing Zone Level 3 Distribution and Core Demilitarized Zone (DMZ) Firewalls Enterprise Network Levels 4–5 Web Apps DNS FTP Internet
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 • Physical Security – limit physical access to authorized personnel: areas, control panels, devices, cabling, and control room – escort and track visitors • Network Hardening – infrastructure framework – e.g. firewalls with intrusion detection and intrusion prevention systems (IDS/IPS), and integrated protection of networking equipment such as switches and routers • End-point Hardening – patch management, antivirus software as well as removal of unused applications, protocols, and services • Application Security – authentication, authorization, and audit software • Device Hardening – change management and restrictive access Defense in Depth Computer Device Physical Network Application
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 • Security is not a bolt-on component • Comprehensive Network Security Model for Defense-in-Depth • Industrial Security Policy • DMZ Implementation • Design Remote Partner Access Policy, with robust & secure implementation
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Panduit/RA Physical Layer Reference Architectures Design Guide PSL-DCPL PSL-DCJB
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 • All network traffic from either side of the DMZ terminates in the DMZ; network traffic does not directly traverse the DMZ • Application Data Mirror • No primary services are permanently housed in the DMZ • DMZ shall not permanently house data • No control traffic into the DMZ • Be prepared to “turn-off” access via the firewall No Direct Traffic Enterprise Security Zone Industrial Security Zone Disconnect Point Disconnect Point DMZReplicated Services
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Level 5 Level 4 Level 3 Level 2 Level 1 Level 0 Terminal Services Patch Management AV Server Application Mirror Web Services Operations Application Server Enterprise Network Site Business Planning and Logistics NetworkE-Mail, Intranet, etc. SCADA App Server SCADA Directory Engineering Workstation Domain Controller SCADA Client Operator Interface SCADA Client Engineerin g Workstatio n Operato r Interfac e Batch Control Discrete Control Drive Control Continuou s Process Control Safety Control Sensors Drives Actuators Robots Enterprise Zone DMZ Process Control Domain Process Control Network Web E-Mail CIP Firewal l Firewall Site Manufacturing Operations and Control Area Supervisory Control Basic Control Process PurdueReferenceModel,ISA-95 IndustrialSecurityStandardISA-99
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 1.Firewall Services (Segmentation, Isolation) 2.Application Services (Behavior Enforcement, Application Intelligence and Awareness, Gateway Capabilities) 3.Logging and Historical Services (Traffic, Event histories) 4.Encryption and Data Integrity Services (remote access, and secure channels for data transfer) 5.IPS/IDS Services (deep packet inspection – Sourcefire and Wurldtech Industrial Signatures 1.Malware Detection and Filtering (deep packet and URL inspection
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 VPN VDI WSA IPS ASA-CX ASA ISE Level 5 Level 4 Level 3 Level 2 Level 1 Level 0 Level 3½ Enterprise Zone DMZ PCD / Manufacturing Zone PCN / Cell / Area Zone 1783-SR
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Use Stratix 5900 (1783-SR) NOT this (or similar such item)
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 DefenseinDepth Securitytechnologiesapplied Authentication, Authorization and Accounting Access Control Lists (ACLs) Secure Browsing (HTTPS) Intrusion Protection and Detection Remote Terminal Session Application Security VLANs Remote Engineers and Partners Plant Floor Applications and Data
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 WAN Plant Engineer Skid Builder System Integrator Remote Site WAN Router Plant Site WAN Router • Stand-alone Remote Industrial Application Example: remote site Requirements Connection out from the Plant, direct access Little to no IT support, little to no alignment with Industrial Automation and Control System security standards Potential Solution IPSecVPN, DMVPN,FlexVPN – ASA5515 and/or STX5900 1783-SR/819 ISR IPSec X many
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Cell/Area Zone #3 Cell/Area Zone #4 FactoryTalk Applications and Services Ring Topology Cell/Area Zone #1 Cell/Area Zone #2 Manufacturing Zone 8000 Managed Layer 2 Switch ETAP - Embedded Layer 2 Switch Ring Topology Enterprise Zone Enterprise Network 5700 Managed Layer 2 Switch Star Topology Embedded Layer 2 Switch Linear Topology Mobile User Lightweight AP (LWAP) AP as Workgroup Bridge (WGB) ERP, Email, Wide Area Network (WAN) 5100 802.11n – Dual Band Access point 8300 Managed Layer 3 Switch 5900 Industrial Services Router
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Levels 0–2 Cell/Area Zones Demilitarized Zone (DMZ) Demilitarized Zone (DMZ) Enterprise Zone Levels 4 and 5 Manufacturing Zone Site Manufacturing Operations and Control Level 3 Internet Enterprise Zone Levels 4 and 5 Enterprise WAN Enterprise Data Center Gbps Link Failover Detection Firewall (Active) Firewall (Standby) Patch Management Terminal Services Application Mirror AV Server Cisco ASA 5500 Remote Access Server • RSLogix 5000 • FactoryTalk View Studio Catalyst 6500/4500 Remote Engineer or Partner Enterprise Connected Engineer Enterprise Edge Firewall HTTPS Cisco VPN Client Remote Desktop Protocol (RDP) Catalyst 3750 StackWise Switch Stack EtherNet/IP IPSECVPN SSLVPN FactoryTalk Application Servers • View • Historian • AssetCentre • Transaction Manager FactoryTalk Services Platform • Directory • Security/Audit Data Servers 1. Remote engineer or partner establishes VPN to corporate network; access is restricted to IP address of plant DMZ firewall 2. Portal on plant firewall enables access to IACS data, files and applications – Intrusion protection system (IPS) on plant firewall detects and protects against attacks from remote host 3. Firewall proxies a client session to remote access server 4. Access to applications on remote access server is restricted to specified plant floor IACS resources through IACS application security
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 1. Identify all connections to SCADA networks 2. Disconnect unnecessary connections to the SCADA network 3. Evaluate and strengthen the security of any remaining connections to the SCADA network 4. Harden SCADA networks by removing or disabling unnecessary services 5. Do not rely on proprietary protocols to protect your system 6. Implement the security features provided by device and system vendors 7. Establish strong controls over any medium that is used as a backdoor into the SCADA network 8. Implement internal and external intrusion detection systems and establish 24-hour-a-day incident monitoring 9. Perform technical audits of SCADA devices and networks, and any other connected networks, to identify security concerns 10. Conduct physical security surveys and assess all remote sites connected to the SCADA network to evaluate their security 11. Establish SCADA “Red Teams” to identify and evaluate possible attack scenarios 12. Clearly define cyber security roles, responsibilities, and authorities for managers, system administrators, and users 13. Document network architecture and identify systems that serve critical functions or contain sensitive information that require additional levels of protection 14. Establish a rigorous, ongoing risk management process 15. Establish a network protection strategy based on the principle of defense-in-depth 16. Clearly identify cyber security requirements 17. Establish effective configuration management processes 18. Conduct routine self-assessments 19. Establish system backups and disaster recovery plans 20. Senior organizational leadership should establish expectations for cyber security performance and hold individuals accountable for their performance 21. Establish policies and conduct training to minimize the likelihood that organizational personnel will inadvertently disclose sensitive information regarding SCADA system design, operations, or security controls 21 Steps to securing a SCADA network http://www.oe.netl.doe.gov/docs/prepare/21stepsbooklet.pdf